|
19 | 19 | }] |
20 | 20 | }, { |
21 | 21 | "Week": 2, |
22 | | - "Title": "Building a Weak Application (Development)", |
| 22 | + "Title": "Building a Weak Application", |
23 | 23 | "Objectives": ["Develop a Rails API", "Deploy to AWS manually", "Explore AWS-CLI & AWS-SDK"], |
24 | 24 | "url": "https://github.com/devsecops/bootcamp/blob/master/Week-2/README.md", |
25 | 25 | "Lessons": [{ |
|
55 | 55 | }] |
56 | 56 | }, { |
57 | 57 | "Week": 4, |
58 | | - "Title": "Keeping the Weak Alive (Operations)", |
| 58 | + "Title": "Keeping the Weak Alive", |
59 | 59 | "Objectives": ["Understanding data generated by attackers", "Detection & alerting with Splunk"], |
60 | 60 | "url": "https://github.com/devsecops/bootcamp/blob/master/Week-4/README.md", |
61 | 61 | "Lessons": [{ |
|
73 | 73 | }] |
74 | 74 | }, { |
75 | 75 | "Week": 5, |
76 | | - "Title": "Building a Rugged Application (Development)", |
| 76 | + "Title": "Building a Rugged Application", |
77 | 77 | "Objectives": ["Service Oriented Architecture (SOA)", "Automated AWS Deployments with CloudFormation", "Whitelisting & Attack Maps"], |
78 | 78 | "url": "https://github.com/devsecops/bootcamp/blob/master/Week-5/README.md", |
79 | 79 | "Lessons": [{ |
|
127 | 127 | }] |
128 | 128 | }, { |
129 | 129 | "Week": 8, |
130 | | - "Title": "Red Team vs Blue Team (Hack Lab)", |
| 130 | + "Title": "Red Team vs Blue Team", |
131 | 131 | "Objectives": ["Put all your skills together", "Hack all the things", "Don't get caught by the Blue Team"], |
132 | 132 | "url": "https://github.com/devsecops/bootcamp/blob/master/Week-8/README.md", |
133 | 133 | "Lessons": [{ |
|
145 | 145 | }] |
146 | 146 | }, { |
147 | 147 | "Week": 9, |
148 | | - "Title": "Presentations: 5-minute Demos", |
| 148 | + "Title": "Presentations", |
149 | 149 | "Objectives": ["Problem-sovling", "Contribute to the open-source community", ""], |
150 | 150 | "url": "https://github.com/devsecops/bootcamp/blob/master/Week-9/README.md", |
151 | 151 | "Lessons": [{ |
|
0 commit comments